Please turn on your JavaScript for this page to function normally.
2022
2022 and the threat landscape: The top 5 future cybersecurity challenges

Digital adoption has rapidly accelerated and as a result, the threat surface has also expanded. As we look ahead to 2022, there will be new and evolving cybersecurity …

face
Major trends in online identity verification for 2022

As more of our lives move online, we expect identity fraud attempts to continue apace. Fortunately, technology is still one step ahead. While some trends may seem bleak, there …

magnify
The importance of vulnerability management for your organization

Everyone is familiar with home burglaries. Criminals case a house looking for easy access through open windows, unlocked doors, open garages, and the like. Hackers take the …

Phishing
How phishing kits are enabling a new legion of pro phishers

Some cybercriminals are motivated by political ideals, others by malice or mischief, but most are only interested in cold, hard cash. To ensure their criminal endeavors are …

lock
The ripple effect: Why protection against supply chain attacks is a must

The SolarWinds attack continues to send ripples across the world of cybersecurity. For the uninitiated, this form of cyber attack was like a gradual spread of poison, and its …

Tal Steinherz
API security awareness: The first step to better assessing the risk

In this Help Net Security interview, Tal Steinherz, CTO at Wib, talks about the importance of API security awareness and how to tackle numerous threats that are plaguing it. …

ransomware
How to combat ransomware with visibility

In the first half of 2021, average ransomware demands surged by 518%, while payments climbed by 82%. There has been a growing number of attacks in healthcare, with 560 …

lock
Implications of strengthening the cybersecurity of small business in America

On November 2, 2021, the House of Representatives passed two bills with the goal of strengthening the cybersecurity of small businesses in America. The first bill, the Small …

users
Big salaries alone are not enough to hire good cybersecurity talent: What else can companies do?

Amid the severe and ongoing cyber skills shortages, both cybersecurity firms and in-house IT and cybersecurity departments are struggling to hire enough talented and qualified …

biometrics
Behavioral biometrics: A promising tool for enhancing public safety

While globalization has enabled easy cross-border movement and transactions, fraudulent activities have, unfortunately, followed suit. The growing demand for a multi-layered …

Cindy Blake
Putting the “sec” in DevSecOps: An overall reduction of risk

In this Help Net Security interview, Cindy Blake, Senior Security Evangelist at GitLab, talks about the importance of integrating security in DevSecOps and how to overcome the …

IoT connection
Your supply chain: How and why network security and infrastructure matter

With digital transformation, the rapid adoption of cloud computing and the IoT, and the global scale of today’s supply chains, cybercriminals have more entry points to …

Don't miss

Cybersecurity news